GPS: Navigating weak memory with ghosts, protocols, and separation
Weak memory models formalize the inconsistent behaviors that one can expect to observe
in multithreaded programs running on modern hardware. In so doing, however, they …
in multithreaded programs running on modern hardware. In so doing, however, they …
A type system for privacy properties
Mature push button tools have emerged for checking trace properties (eg secrecy or
authentication) of security protocols. The case of indistinguishability-based privacy …
authentication) of security protocols. The case of indistinguishability-based privacy …
Type-based verification of electronic voting protocols
E-voting protocols aim at achieving a wide range of sophisticated security properties and,
consequently, commonly employ advanced cryptographic primitives. This makes their …
consequently, commonly employ advanced cryptographic primitives. This makes their …
Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations
We present a new type system for verifying the security of reference implementations of
cryptographic protocols written in a core functional programming language. The type system …
cryptographic protocols written in a core functional programming language. The type system …
Differential privacy by ty** in security protocols
Differential privacy is a confidentiality property for database queries which allows for the
release of statistical information about the content of a database without disclosing personal …
release of statistical information about the content of a database without disclosing personal …
Security and privacy by declarative design
The privacy of users has rapidly become one of the most pervasive and stringent
requirements in distributed computing. Designing and implementing privacy-preserving …
requirements in distributed computing. Designing and implementing privacy-preserving …
[PDF][PDF] Equivalence properties by ty** in cryptographic branching protocols
V Cortier, N Grimm, J Lallemand… - … 2018, Held as Part of the …, 2018 - library.oapen.org
Recently, many tools have been proposed for automatically analysing, in symbolic models,
equivalence of security protocols. Equivalence is a property needed to state privacy …
equivalence of security protocols. Equivalence is a property needed to state privacy …
Modular verification of distributed systems with Grove
U Sharma - 2022 - dspace.mit.edu
Grove is a new framework for machine-checked verification of distributed systems. Grove
focuses on modular verification. It enables developers to state and prove specifications for …
focuses on modular verification. It enables developers to state and prove specifications for …
Affine refinement types for secure distributed programming
Recent research has shown that it is possible to leverage general-purpose theorem-proving
techniques to develop powerful type systems for the verification of a wide range of security …
techniques to develop powerful type systems for the verification of a wide range of security …
[PDF][PDF] Equivalence Properties by Ty** in Cryptographic Branching Protocols
M Maffei - Principles of Security and Trust LNCS 10804 - dlib.hust.edu.vn
Recently, many tools have been proposed for automatically analysing, in symbolic models,
equivalence of security protocols. Equivalence is a property needed to state privacy …
equivalence of security protocols. Equivalence is a property needed to state privacy …